Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/06/2024, 14:04

General

  • Target

    ae99906d31e01eb7101a175b706cea87a00e62ee7547f916080c9efafc48d958_NeikiAnalytics.exe

  • Size

    135KB

  • MD5

    14169dd9c539e2ea4b115e5009028830

  • SHA1

    fbb10e26b81c90c7816ba68c55fba22f06a593d4

  • SHA256

    ae99906d31e01eb7101a175b706cea87a00e62ee7547f916080c9efafc48d958

  • SHA512

    c0d9dd58ec7004b784ba28df05e6cc4930694d5176c5c1ba17e44114dbf5c5b46b8d299223a844cc235eb5e968d77cb2232b3d3e7a777fc02fa86544ad1225e6

  • SSDEEP

    1536:UfsEqouTRcG/Mzvgf7xEuvnXNTRdUzwTekUOisZ1yDDajtXbVXr:UVqoCl/YgjxEufVU0TbTyDDalRr

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae99906d31e01eb7101a175b706cea87a00e62ee7547f916080c9efafc48d958_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\ae99906d31e01eb7101a175b706cea87a00e62ee7547f916080c9efafc48d958_NeikiAnalytics.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3040
    • \??\c:\windows\resources\themes\explorer.exe
      c:\windows\resources\themes\explorer.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4392
      • \??\c:\windows\resources\spoolsv.exe
        c:\windows\resources\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2496
        • \??\c:\windows\resources\svchost.exe
          c:\windows\resources\svchost.exe
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in System32 directory
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3924
          • \??\c:\windows\resources\spoolsv.exe
            c:\windows\resources\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:3676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Resources\Themes\explorer.exe

    Filesize

    135KB

    MD5

    d544373912200fe653f8f887cd2dbdfc

    SHA1

    9480863068a64b6e0ac4bf31d7f519976b78a739

    SHA256

    cf7103e635d8180f0c93843ca765db87e6106b5138ea0a985be33da5e738415d

    SHA512

    26146808118c0097fdc8e5f7a54c1f0bca9e31e49049a36401e670108c1059d86c01797005627b9119d1b7064327c77b3bb9fe4040e0c1e9df92baecc16db030

  • C:\Windows\Resources\svchost.exe

    Filesize

    135KB

    MD5

    20be4cd5035845ac8d79f5d3a35617be

    SHA1

    30cf272b923ae0d4ea03b15a50229a89578e44b4

    SHA256

    ec2cf6a9a6922a3a096bdbf435940c7ddd762558d937c72e1e58fcb7f2219e8d

    SHA512

    ffb4f594d771b6209913ed658d3b8a737fd7b9872d649dab25297ddfe6d6b9492c42cb914bb2c7df1f6d30d4314663761278e836e79d3bbb9acb86c02bd37df7

  • \??\c:\windows\resources\spoolsv.exe

    Filesize

    135KB

    MD5

    82a6486ddbd1dadd273f92529ce26a37

    SHA1

    12a254aa72f947e389402222ecda979ea15a7262

    SHA256

    42749bd32ec3c7701fce400b1ad7f07dbdb6ffab9f4ab209b766c58970a87867

    SHA512

    5b921e92d08e8a4d1c7500a75f3fe6a63cd581ccbf6acf1a13b2966bf2821036dd397f811915852ec8465df4301516c28d038258713604eccc3b0b6476c9e554

  • memory/2496-34-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3040-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3040-35-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3676-33-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4392-9-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB